Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Merge
Merge merge Pacs |
|
| Vendors & Products |
Merge
Merge merge Pacs |
Wed, 29 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Merge PACS 7.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions by crafting malicious HTML forms targeting the merge-viewer endpoint. Attackers can submit POST requests to /servlet/actions/merge-viewer/summary with login credentials to hijack user sessions and gain unauthorized access to the PACS system. | |
| Title | Merge PACS 7.0 Cross-Site Request Forgery via merge-viewer | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T12:45:46.990Z
Reserved: 2026-04-29T11:59:44.886Z
Link: CVE-2018-25298
Updated: 2026-04-30T12:43:19.024Z
Status : Awaiting Analysis
Published: 2026-04-29T20:16:23.970
Modified: 2026-04-30T15:48:26.580
Link: CVE-2018-25298
No data.
OpenCVE Enrichment
Updated: 2026-04-30T14:00:22Z